Behavioral task
behavioral1
Sample
a19ca4c84df9e57d2c8f5543c4db9d52.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
a19ca4c84df9e57d2c8f5543c4db9d52.exe
Resource
win10v2004-20231025-en
General
-
Target
a19ca4c84df9e57d2c8f5543c4db9d52.exe
-
Size
322KB
-
MD5
a19ca4c84df9e57d2c8f5543c4db9d52
-
SHA1
e3566ba1659d1a7f554dd85de286ac0bdf71ae4a
-
SHA256
86f8e546815bd0b77b0fcc906b700caa5baed1568197378a20fa6b581a2ab709
-
SHA512
4b13791602ef97be25f2c0ab7c40478f2d792a0b189f10cc1da71a0d54a4a2ad0c8bb543d2b5b96015a83a37858bfa4207b636c82db8d2bc18ec44a70d1904f9
-
SSDEEP
6144:21pgEgRUcmvB2ePvoAVvHoKjBZZd036CS3Q:2EWxgAVvLBfds6CR
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a19ca4c84df9e57d2c8f5543c4db9d52.exe
Files
-
a19ca4c84df9e57d2c8f5543c4db9d52.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ